Cursor Windows client set proxy to capture HTTPS request

Hi All,

I’m trying to analyze network traffic from the Cursor client through a proxy (mitmproxy) for debugging purposes, but I’m having difficulty capturing HTTPS traffic properly.

What I’ve tried:

  • Set up system proxy pointing to mitmproxy

  • Installed mitmproxy’s CA certificate in system certificate store

  • Enabled Cursor’s proxy settings (though I’m not sure if there are specific proxy configurations for Cursor)

The issue:
While I can see some HTTP traffic, HTTPS requests either fail or don’t appear in mitmproxy at all. This suggests there might be certificate pinning or other security measures preventing interception.

My questions:

  1. Does Cursor client implement SSL pinning that prevents HTTPS traffic inspection?

  2. Are there specific proxy configuration settings or command-line flags for Cursor to enable proper proxy support?

  3. If SSL pinning exists, is there a way to disable it for debugging purposes (maybe via settings or build flags)?

  4. Has anyone successfully configured Cursor to work with debugging proxies like mitmproxy or Charles Proxy?

I’m particularly interested in understanding how Cursor handles proxy configuration and whether there are documented ways to work with debugging tools.

Any insights or experiences would be greatly appreciated!

Thanks in advance.